Foreign Policy Essay
Jan. 6 and Beyond: Why the U.S. Should Pass Domestic Terrorism Legislation
Domestic terrorism legislation is still useful—even if Jan. 6 rioters have been prosecuted without a federal law on the books.
Domestic terrorism legislation is still useful—even if Jan. 6 rioters have been prosecuted without a federal law on the books.
Your weekly summary of everything on the site.
The FTC shows again that some companies widely share Americans’ health data—and Congress needs to do more.
The post-Title 42 rule aims to reduce asylum-seekers’ reliance on unauthorized entry but faces practical and legal hurdles.
Thursday was sentencing day for some senior Oath Keepers, and Lawfare Senior Editor Roger Parloff spent the day in court listening to and watching the sentencing of Elmer Stewart Rhodes III and Kelly Meggs, two Oath Keepers chieftains who were convicted of seditious conspiracy in connection with the Jan. 6 insurrection. They got a lot of time: Rhodes got 18 years; Meggs got 12. They also got a terrorism enhancement. It was a bad day if you're an Oath Keeper and a really bad day if you're a Proud Boy.
The joint advisory warns of the tactics, techniques, and procedures used by a China state-sponsored cyber actor targeting U.S. critical infrastructure organizations.
This week, Alan, Quinta, and Scott were reunited to celebrate Alan's gradual physical and mental decline, and to talk over the week in national security news, including:
Twitter v. Taamneh alters the Justice Against Sponsors of Terrorism Act’s vague aiding and abetting standard but provides limited clarity.
Policymakers can strengthen both the ASDA and ICADA within a national security context, using the CHIPS Act as a model for the drone sector.
At 9:02 a.m. on April 19, 1995, a bomb built by Timothy McVeigh exploded in front of the Alfred P. Murrah Federal Building in downtown Oklahoma City. One hundred sixty-eight people died and hundreds more were injured in what remains the deadliest act of domestic terrorism in U.S. history.
The United States needs to create a government-wide process to carefully weigh if and when it would ever use deepfakes.
The two cases involve the First Amendment implications of public officials blocking others on social media.
The Supreme Court last week issued the biggest opinion in the history of the internet—except that it didn’t. Rather, it issued an opinion in a case involving the Anti-Terrorism Act (ATA) and the Justice Against Sponsors of Terrorism Act (JASTA), finding there was no cause of action and thus dismissed for further consideration the biggest case in the history of the internet.
The Pentagon has a new tech strategy! What does it say, what impact will it have, and what do its authors think about technological change and warfare? Dr. Nina Kollars, advisor to Under Secretary of Defense for Research and Engineering (OUSD(R&E)) Heidi Shyu, and R&E’s Chief Data Officer Cyrus Jabbari join us to discuss in a wide ranging and at times philosophical conversation about:
The latest episode of the Cyberlaw Podcast.
The first class of Lawfare's cybersecurity and hacking course is now available to the public.
The 2022 guidelines establish express protections for receiving and publishing government secrets.
Recent revisions barring foreign lawyers in national security cases call into question Hong Kong’s commitment to its obligations under international human rights law.
Hacking and cybersecurity are evergreen issues, in the news and on Lawfare. Scott Shapiro, the Charles F. Southmayd Professor of Law and Professor of Philosophy at Yale Law School, has a new book on how and why hacking works and what to do about it, called “Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks.”
After Montana’s governor codified a law banning the social media platform, TikTok is claiming that the bill was unconstitutional.